Contents

Automatic Control and Computer Sciences


Vol. 59, No. 8, 2025


Reconfiguration of the Development Model of an Information Security Management System: Interaction between Core Modules and the Operator

A. F. Suprun, Yu. V. Vedernikov, A. Yu. Gar’kushev, and A. V. Lipis p. 1193  abstract

Study of the Problems of Information-Security Auditing of Geographically Distributed Internet-of-Things Devices

V. O. Erastov, E. A. Zubkov, and D. P. Zegzhda p. 1201  abstract

Predictive Analysis of Information Flows in Information Security Systems of Telecommunication Complexes

V. L. Gorbunov and A. I. Faizullina p. 1209  abstract

Network Traffic Anonymization in Blockchain Systems Based on Garlic Routing

V. M. Krundyshev, A. K. Skrypnikov, and M. O. Kalinin p. 1217  abstract

Protection of Neural Network Models from Privacy Breach Threats in Federated Learning Using Optimization Methods

D. S. Lavrova and P. D. Bezborodov p. 1224  abstract

From Exploitation to Protection: Analysis of Attacks on Large Language Models

S. V. Bezzateev and I. S. Velichko p. 1230  abstract

Trust-Model-Based Method for Protecting Global Models in Federated Learning Systems

V. M. Krundyshev, V. K. Cheskidov, and M. O. Kalinin p. 1242  abstract

Generalized Method for Comparative Analysis of Fuzz-Testing Tools

R. A. Ognev and D. P. Zegzhda p. 1253  abstract

Automated Method for Evaluating the Correctness of Distributed Algorithms Using Chaos Engineering Testing

A. D. Dakhnovich, A. A. Lyrchikov, and D. A. Moskvin p. 1260  abstract

Automated Software Security Analysis for the Android OS

E. Yu. Pavlenko and I. A. Anoshkin p. 1270  abstract

Fuzz Testing of Closed-Source Software Using Large Language Models

T. D. Ovasapyan, D. A. Gavrichkov, and D. V. Ivanov p. 1278  abstract

Automated Security Scanning and Analysis of Container Images

P. O. Semenov, S. A. Yudin, and G. S. Kubrin p. 1285  abstract

Analysis of Malware Detection Methods Using Large Language Models and eBPF Technology

E. Yu. Pavlenko and M. S. Ivanov p. 1292  abstract

Method for Detecting Latent Vulnerabilities at the Final Stage of Software Development

A. S. Cherevan’ and A. P. Lapsar’ p. 1300  abstract

Detection of Potentially Malicious Activities in CI/CD Pipelines Based on Build Agent Behavior Analysis

E. V. Zhukovskii, V. A. Bugaev, and A. A. Lyrchikov p. 1307  abstract

Memory-Based Covert Channels in the TLS Protocol

M. A. Finoshin, I. D. Ivanova, I. Yu. Zhukov, and A. V. Zuikov p. 1315  abstract

Ensuring Byzantine Fault Tolerance of a Distributed Ledger in a Smart City Based on a Trust Model

M. O. Kalinin, V. M. Krundyshev, and O. S. Vasil’ev p. 1322  abstract

Model of Interaction of Mobile Ad Hoc Network Nodes Taking into Account Protection against Active Network Attacks

M. A. Pakhomov p. 1328  abstract

Detection of Honeypot Systems Based on a Comprehensive Analysis of Node Performance Indicators

T. D. Ovasapyan, D. A. Ponomarev, D. V. Ivanov, and E. V. Zavadskii p. 1338  abstract

Detecting the Spread of False News Content Using Machine Learning

D. S. Lavrova, A. A. Zyryanova, and A. A. Lyrchikov p. 1345  abstract

Application of a Genetic Algorithm for Selecting Neural Network Hyperparameters

V. V. Platonov, A. F. Suprun, Ya. E. Yanbarisova, and V. G. Anisimov p. 1357  abstract

Combination of Methods for Selective Teacher Intervention in the Student’s Learning Process and Low-Rank Adaptation in the Knowledge Distillation Models

I. A. Sikarev, T. M. Tatarnikova, and V. M. Abramov p. 1364  abstract

Multisignature on Isogenies of Elliptic Curves with Participant Masking and Authentication

E. B. Aleksandrova and S. O. Kostin p. 1371  abstract

On the Applicability of the Chi-Square Statistic in the Problem of Determining the Parameters of Block Encryption Algorithms

V. O. Mironkin and N. A. Yurasov p. 1377  abstract

Lattice-Based Commitment Scheme for Proving Linear Relations between Hidden Values

E. B. Aleksandrova and D. M. Samareva p. 1387  abstract

Key Pre-Distribution Technique Using Shamir’s Secret Sharing Scheme

N. N. Shenets, E. B. Aleksandrova, A. S. Konoplev, and N. V. Gololobov p. 1395  abstract

Method for Predicting the Correlation Properties of Marker Bipolar Sequences in Digital Watermarking Using the Patchwork Method

M. V. Gofman and A. A. Kornienko p. 1403  abstract

Countering Illegitimate Activations of a Smart Voice Assistant

M. A. Poltavtseva, A. V. Bolokan, and P. V. Semyanov p. 1415  abstract

Study of Adversarial Attacks on Classical Machine Learning Models in the Context of Network Threat Detection

P. E. Yugai p. 1426  abstract

Application of Convolutional Neural Networks to Increase the Security Level of Steganographic Methods

A. I. Bezborodko and M. A. Prisich p. 1440  abstract

Intelligent Data Analysis and Processing for Detecting Insider Data Confidentiality Breaches in a DBMS

M. A. Poltavtseva and E. S. Lavrenko p. 1448  abstract

Using Entropy Metrics to Detect Data Integrity Attacks in Real Time

T. D. Ovasapyan, T. A. Bondarenko, and A. A. Piskov p. 1457  abstract

Optimization of Data Obfuscation in Big Data Processing and Storage Systems

M. A. Poltavtseva, O. A. Izotova, D. V. Ivanov, and D. P. Zegzhda p. 1464  abstract

Construction of a Semantic Space of Intentionalities Using Generative Pretrained Models to Solve the Problem of Spam Filtering

I. Yu. Zhukov, E. E. Balashova, A. P. Mandrov, and N. D. Kravchenko p. 1475  abstract

Protecting Smart City Blockchain Systems from Selfish Mining Attacks

M. O. Kalinin and A. S. Konoplev p. 1484  abstract

Ensuring the Cybersecurity of the Functional Network of CII Facilities Using the Optimal Honeypot Node Deployment Strategy

E. V. Zavadskii p. 1491  abstract

Optimization of a Search Information System in a Database of Directive Documents

F. G. Pashaev, S. E. Pashaeva, and N. A. Maksudova p. 1497  abstract

Analysis of the Potential for Using Biometric Characteristics to Identify Insider Threats Based on Psycho-Emotional State

S. V. Kornienko, S. E. Adadurov, A. A. Kornienko, and E. D. Osipenko p. 1504  abstract

Architecture of a Software System for Protecting Wireless Ad Hoc Networks from Active Network Attacks

M. A. Pakhomov, E. Yu. Pavlenko, and D. S. Lavrova p. 1512  abstract

Artificial Immunization in Hierarchical and Peer-to-Peer Networks to Protect Against Cyber Threats

E. Yu. Pavlenko and N. N. Samarin p. 1519  abstract

Protection of DevOps Pipelines: Automation of Security within DevSecOps

S. V. Bezzateev and A. V. Blinov p. 1527  abstract

Application of Large Language Models in the Problem of Event Forecasting

A. D. Dakhnovich, V. M. Bogina, and A. A. Makeeva p. 1536  abstract